Reporter reports can be used to analyze data from a penetration-testing regimen in all of the
following examples, EXCEPT
A.
Possible worm/malware activity.
B.
Tracking attempted port scans.
C.
Analyzing traffic patterns against public resources.
D.
Analyzing access attempts via social-engineering.
Explanation: